The ctl_request_sense function could expose up to three bytes of the kernel heap to userspace. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.
2024-09-05T05:15:13.757
2024-09-05T21:22:04.810
Analyzed
CVSSv3.1: 8.8 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | freebsd | freebsd | < 13.3 | Yes |
Operating System | freebsd | freebsd | 13.3 | Yes |
Operating System | freebsd | freebsd | 13.3 | Yes |
Operating System | freebsd | freebsd | 13.3 | Yes |
Operating System | freebsd | freebsd | 13.3 | Yes |
Operating System | freebsd | freebsd | 13.3 | Yes |
Operating System | freebsd | freebsd | 13.3 | Yes |
Operating System | freebsd | freebsd | 13.4 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.1 | Yes |
Operating System | freebsd | freebsd | 14.1 | Yes |
Operating System | freebsd | freebsd | 14.1 | Yes |
Operating System | freebsd | freebsd | 14.1 | Yes |